DjVu: User-assisted execution of arbitrary code
Gentoo Linux Security Advisory
||GLSA 201402-13 / djvu
||February 09, 2014
||February 09, 2014: 1
All supported architectures
A vulnerability in DjVu could result in execution of arbitrary code
or Denial of Service.
DjVu is a web-centric format and software platform for distributing
documents and images.
A vulnerability has been discovered in DjVu. Please review the CVE
identifier referenced below for details.
A remote attacker could entice a user to open a specially crafted DjVu
file, possibly resulting in execution of arbitrary code with the
privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All DjVu users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/djvu-22.214.171.124"